Loading
Generated remediation guidance and an executive summary. No account required.
A command injection vulnerability exists in the “dash export” feature of the ScienceLogic SL1 that takes unsanitized user controlled input and passes it directly to a shell command. This allows for the injection of arbitrary commands to the underlying operating system.
Use CWE-78, Sciencelogic vendor hub and Sl1 product page to widen CVE-2022-48581 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-9537, CVE-2022-48604 and CVE-2022-48603 for nearby disclosures in the same product family.